D'Agents: Security in a Multiple-Language, Mobile-Agent System

Mobile-agent systems must address three security issues: protecting an individual machine, protecting a group of machines, and protecting an agent. In this chapter, we discuss these three issues in the context of D'Agents, a mobile-agent system whose agents can be written in Tcl, Java and Scheme. (D'Agents was formerly known as Agent Tcl.) First we discuss mechanisms existing in D'Agents for protecting an individual machine: (1) cryptographic authentication of the agent's owner, (2) resource managers that make policy decisions based on the owner's identity, and (3) secure execution environments for each language that enforce the decisions of the resource managers. Then we discuss our planned market-based approach for protecting machine groups. Finally we consider several (partial) solutions for protecting an agent from a malicious machine.

[1]  Holger Peine,et al.  The Architecture of the Ara Platform for Mobile Agents , 1999, Mobile Agents.

[2]  John K. Ousterhout,et al.  Safe Tcl: a toolbox for constructing electronic meeting places , 1995 .

[3]  Radia J. Perlman,et al.  Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.

[4]  John K. Ousterhout,et al.  The Safe-Tcl Security Model , 1998, USENIX Annual Technical Conference.

[5]  David Kotz,et al.  AGDB: A Debugger for Agent Tcl , 1997 .

[6]  Daniela Rus,et al.  Digital Digital Transportable Information Agents Transportable Information Agents , 1996 .

[7]  Marvin A. Sirbu,et al.  NetBill: An Internet commerce system optimized for network delivered services , 1995, Digest of Papers. COMPCON'95. Technologies for the Information Superhighway.

[8]  Luís Valente,et al.  Mobile agent security and Telescript , 1996, COMPCON '96. Technologies for the Information Superhighway Digest of Papers.

[9]  Jean Bacon,et al.  Flexible distributed programming using mobile code , 1996, EW 7.

[10]  David Chaum,et al.  'Minting' electronic cash , 1997 .

[11]  Danny B. Lange,et al.  A Security Model for Aglets , 1997, IEEE Internet Comput..

[12]  Munehiro Fukuda,et al.  Distributed Computing Using Autonomous Objects , 1996, Computer.

[13]  Daniela Rus,et al.  Market-based resource control for mobile agents , 1998, AGENTS '98.

[14]  Stephanie Forrest,et al.  Infect Recognize Destroy , 1996 .

[15]  Gary Cornell,et al.  Core Java , 1996, The SunSoft Press Java series.

[16]  Jonathan Rees,et al.  A tractable Scheme implementation , 1994, LISP Symb. Comput..

[17]  Robert S. Gray,et al.  Agent Tcl: a Exible and Secure Mobile-agent System , 1996 .

[18]  John K. Ousterhout,et al.  A Safe Tcl Toolkit for Electronic Meeting Places , 1995, USENIX Workshop on Electronic Commerce.

[19]  Robbert van Renesse,et al.  Cryptographic support for fault-tolerant distributed computing , 1996, EW 7.

[20]  Jim White,et al.  Telescript technology: mobile agent , 1999 .

[21]  Fred B. Schneider,et al.  Towards Fault-Tolerant and Secure Agentry , 1997, WDAG.

[22]  Robbert van Renesse,et al.  Operating system support for mobile agents , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[23]  Michael H. Coen,et al.  SodaBot: A Software Agent Environment and Construction System , 1994, AAAI.

[24]  Gene Tsudik,et al.  Itinerant Agents for Mobile Computing , 1995, IEEE Communications Surveys & Tutorials.

[25]  Peter C. Wayner,et al.  Agents Unleashed: A Public Domain Look at Agent Technology , 1995 .

[26]  David Wong,et al.  Concordia: An Infrastructure for Collaborating Mobile Agents , 1997, Mobile Agents.